ID

VAR-200210-0084


CVE

CVE-2002-0952


TITLE

Sun Solaris rcp Command Line Parameter Local Buffer Overflow Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200210-141

DESCRIPTION

Cisco ONS15454 optical transport platform running ONS 3.1.0 to 3.2.0 allows remote attackers to cause a denial of service (reset) by sending IP packets with non-zero Type of Service (TOS) bits to the Timing Control Card (TCC) LAN interface. The ONS15454 is an optical network platform manufactured and distributed by Cisco. Under some circumstances, it may be possible to stop the ONS15454 from handling traffic. The receipt of this type of packet via the TCC interface causes the reset of the TCC interface. Solaris 9 is a UNIX operating system developed by Sun, which includes the rcp program for remote copying between hosts. The rcp program does not perform correct boundary checks when processing parameter data submitted by users. Local attackers can exploit this vulnerability to carry out buffer overflow attacks. There is a loophole in rcp's processing of super long command line parameters. The user submits a file name exceeding 10,000 bytes, and the destination host name and destination file name are used as parameters for the rcp program to execute, which may cause buffer overflow. Because rcp runs as suid root in the system Attribute installation, carefully constructed parameter data may allow an attacker to execute arbitrary instructions on the system with root privileges

Trust: 1.26

sources: NVD: CVE-2002-0952 // BID: 5058 // VULHUB: VHN-5341

AFFECTED PRODUCTS

vendor:ciscomodel:optical networking systems softwarescope:eqversion:3.2.0

Trust: 1.6

vendor:ciscomodel:optical networking systems softwarescope:eqversion:3.1.0

Trust: 1.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:3.1.0

Trust: 0.6

vendor:ciscomodel:ons 15454 optical transport platformscope:eqversion:3.2.0

Trust: 0.6

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.2.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.1.0

Trust: 0.3

sources: BID: 5058 // CNNVD: CNNVD-200210-141 // NVD: CVE-2002-0952

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0952
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200210-141
value: MEDIUM

Trust: 0.6

VULHUB: VHN-5341
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2002-0952
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-5341
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-5341 // CNNVD: CNNVD-200210-141 // NVD: CVE-2002-0952

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0952

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200210-141

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200210-141

EXTERNAL IDS

db:BIDid:5058

Trust: 2.0

db:NVDid:CVE-2002-0952

Trust: 1.7

db:CNNVDid:CNNVD-200210-141

Trust: 0.7

db:XFid:9377

Trust: 0.6

db:CISCOid:20020619 CISCO ONS15454 IP TOS BIT VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-5341

Trust: 0.1

sources: VULHUB: VHN-5341 // BID: 5058 // CNNVD: CNNVD-200210-141 // NVD: CVE-2002-0952

REFERENCES

url:http://www.securityfocus.com/bid/5058

Trust: 1.7

url:http://www.cisco.com/warp/public/707/ons-tos-vuln-pub.shtml

Trust: 1.7

url:http://www.iss.net/security_center/static/9377.php

Trust: 1.7

url:http://www.cisco.com/univercd/cc/td/doc/product/ong/15400/r33docs/sftuprgd/u2to33.htm

Trust: 0.3

url:http://www.cisco.com/univercd/cc/td/doc/product/ong/15400/r33docs/sftuprgd/u3to33.htm

Trust: 0.3

sources: VULHUB: VHN-5341 // BID: 5058 // CNNVD: CNNVD-200210-141 // NVD: CVE-2002-0952

CREDITS

alex medvedev※ alexm@pycckue.org

Trust: 0.6

sources: CNNVD: CNNVD-200210-141

SOURCES

db:VULHUBid:VHN-5341
db:BIDid:5058
db:CNNVDid:CNNVD-200210-141
db:NVDid:CVE-2002-0952

LAST UPDATE DATE

2024-08-14T14:59:32.623000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-5341date:2018-10-30T00:00:00
db:BIDid:5058date:2002-06-19T00:00:00
db:CNNVDid:CNNVD-200210-141date:2005-05-02T00:00:00
db:NVDid:CVE-2002-0952date:2018-10-30T16:25:05.637

SOURCES RELEASE DATE

db:VULHUBid:VHN-5341date:2002-10-04T00:00:00
db:BIDid:5058date:2002-06-19T00:00:00
db:CNNVDid:CNNVD-200210-141date:2002-06-19T00:00:00
db:NVDid:CVE-2002-0952date:2002-10-04T04:00:00